ACCT341, Chapter 9, Ref. 9b Assignment 9b 1. Why do you think the following situations are considered red flags for employee fraud: (A) Employee wants time to rewrite records for neatness? (B) Employee says he unexpectedly received an inheritance from a rich relative? (C) Employee has been skipping vacations? (D) Employee regularly turns down promotions? 2. Read the article below entitled “Enemies Within” by Joseph Wells. Answer the following questions: (A) What percent of American workers is estimated to steal on the job? (B) What portion of asset misappropriation involves cash? Why? (C) What are three ways that cash can be embezzled? (D) Define skimming and give three examples. (E) Why is larceny not one of the favorite methods for embezzlement? (F) What are five forms of fraudulent disbursement? (G) Briefly summarize three examples of fraudulent disbursement. (H) What method did Kay Lemon use to cover her tracks? (I) What are three internal controls that could have prevented Lemon’s fraud? 3. Read the article below entitled “Small Business, Big Losses” by Joseph Wells. Answer the following questions: (A) Why are small businesses the most vulnerable to fraud? (B) Why is determining the true cost of fraud very difficult? (C) What percent of revenue is estimated to be lost because of occupational fraud? (D) When comparing asset mis-appropriation with financial statement fraud, what is the relationship between frequency and severity? (E) Which of the forms of cash fraud is the most common? (F) Which of the forms of fraudulent disbursement is most common? (G) In light of the most common initial detection method, what does the Sarbanes-Oxley Act (SarbOx or SOX) require? (H) What data support the effectiveness of anonymous hotlines? (I) What relationship is there between the size of a fraud and the perpetrator’s position in the company? (J) Why are frauds committed by owner/executives more likely detected through a tip than caught through internal controls? 4. Read the article below entitled “The Case of the Pilfering Purchasing Manager”. Answer the following questions: (A) How did Bruce get started down the fraud road? (B) List the red flags in the Kickback Checklist that you think apply in Bruce’s case. (C) The three conditions for a fraud to take place are known as the fraud triangle. The three conditions are: an incentive or pressure to commit fraud, the opportunity to commit fraud (because of weaknesses in controls, etc.), and the ability to rationalize the fraud. (1) What incentives did Bruce have to commit fraud? (2) What internal control deficiencies allowed Bruce the opportunity to commit fraud? (3) How could he have rationalized it? (D) In the end, what happened to Bruce and the vendor? Journal of Accountancy, December, 2001 Asset misappropriation comes in many forms. Enemies Within BY JOSEPH T. WELLS ometimes, the truth isn’t very pretty. Consider, for example, the American workforce. Although regarded by many as the finest in the world, it has a dark side. According to estimates, a third of American workers have stolen on the job. Many of these thefts are immaterial to the financial statements, but not all are—especially to small businesses. Regardless of the amounts, CPAs are being asked to play an increasingly important role in helping organizations prevent and detect internal fraud and theft. Responding to these demands requires the auditor to have a thorough understanding of asset misappropriation. CPAs with unaudited clients can provide additional services by suggesting a periodic examination of the cash account only. Although “internal theft” and “employee fraud” are commonly used, a more encompassing term is “asset misappropriation.” For our purposes, asset misappropriation means more than theft or embezzlement. An employee who wrongly uses company equipment (for example, computers and software) for his or her own personal benefit has not stolen the property, but has misappropriated it. Employees—from executives to rank-and-file workers—can be very imaginative in the ways they scam their companies. But in a study of 2,608 cases of occupational fraud and abuse, we learned that asset misappropriation can be subdivided into specific types; the most prevalent are skimming and fraudulent disbursements. THE FRAUD TREE Over the years, the asset misappropriation chart has become known as the “fraud tree” for its numerous branches. The tree’s trunk consists of two major asset types: cash, and inventory and all other assets. Crooked employees clearly favor misappropriating the former—nearly nine in 10 illegal schemes in the study involved the cash account. The reasons should not be surprising: Cash is fungible, has a specific value and is easily transported. Inventory—except for consumer goods—has limited usefulness to a thief; an employee in a ball bearing plant can have a hard time converting the loot into cash. And of course, many business enterprises don’t have a physical inventory at all. Source: “Report to the Nation,” 1996. Institute of Certified Fraud Examiners. See the full report at www.cfenet.com. THE BRANCHES On the branches of the fraud tree are three main ways to embezzle cash: skimming, larceny and fraudulent disbursements. Skimming can be described as the removal of cash prior to its entry into the accounting system. Here are some examples: The manager of a movie theater skimmed $30,000. During the theater’s slow times, when he thought he was not being observed, the manager would print a viewer’s ticket but keep it for himself and allow the customer to enter the movie without a ticket. Then during busy times, he would resell the tickets he had withheld and pocket the cash. The manager was caught by an alert employee who happened to pass by and saw what he was doing. In a legendary story, the manager of a retail store with six cash registers brought in his own register and set it up in an empty checkout lane. All sales going through the seventh register went directly to the manager! Although you would think someone would notice, this scheme reputedly went undetected until a physical count showed huge inventory shortages. A government mail-room employee skimmed more than $2 million in taxpayer refund checks that had been returned by the post office for bad addresses. The employee, with the help of several outside accomplices, was able to deposit the stolen checks into various banks and withdraw the proceeds. The scheme was uncovered when a taxpayer called about an overdue refund and found out that his check had already been cashed. Larceny is the removal of cash from the organization after it has been entered into the accounting records. Most of these schemes are detected through bank reconciliations and cash counts. Larceny is therefore not one of employees’ favorite illicit methods; it accounted for only 3% of the cases in the study and 1% of the losses. Here are some examples of cash larceny: A bookkeeping employee, responsible for posting accounts receivable in a small business, stole some of the cash payments but nonetheless posted the transaction to the company’s accounts-receivable detail. Within months, the theft had risen to more than $200,000, seriously depleting the business’s cash. When a bank reconciliation revealed a major discrepancy between the accounts-receivable detail and cash, the scheme was uncovered. An employee in charge of taking the company’s money to the bank would regularly remove currency, then alter the company’s deposit slip to reflect the lower deposit amount. The worker, obviously not an accounting genius, didn’t realize the discrepancy would be discovered when sales and cash were reconciled. Additional research of 732 fraudulent disbursement cases showed they can be subdivided into at least six specific types: check tampering, false register disbursements, billing schemes, payroll schemes, expense reimbursement schemes and other fraudulent disbursements. Following are a few common examples: A purchasing agent for a major corporation set up a vendor file in his wife’s maiden name, then went on to approve more than $1 million in company payments to her. The supporting documentation consisted of the wife’s invoices for “consulting services” that were never rendered. A clerk in the purchasing department, suspicious of the agent’s recent purchase of a new boat and car, caught on to the scheme and turned him in. The CEO of a small nonprofit agency stole $35,000 from its coffers by submitting “check requests” to the accounting department. The checks were made payable to outside bank accounts the CEO controlled. The accounting personnel, fearful of angering the boss, made out the checks and delivered them to him. One accounting clerk finally had enough and alerted the outside auditors, who confirmed the disbursements were not legitimate. A worker for one company submitted an expense reimbursement for a trip he supposedly took for business purposes. Actually, he took his girlfriend to a bicycle rally and attempted to charge the expense to the company. One problem: On his itinerary, the worker listed the independent auditor who was examining his expense reimbursement as his traveling companion—not a smart move. Employees who set up dummy companies for fraudulent disbursements often give clues to their activities. They will use their own initials for the company name, rent a post office box or mail drop to receive checks, or use a dummy company name and their own home address. CASE STUDY: TOO TEMPTING, TOO EASY Regardless of the method or the asset involved, all asset misappropriation has the same effect on the books of account. Take the following actual case as an example: Kay Lemon, a seemingly prim-and-proper grandmother, stole $416,000 from a small Nebraska lighting store where she had been employed for 20 years as a bookkeeper. Lemon spent three years in the Nebraska Women’s Correctional Institute after confessing that she’d been hitting the books for eight years and had blown all the loot on herself and her family. Lemon’s crime is typical of the risk to small business: The lighting store’s CPA prepared only the company’s tax returns, so the business was not audited. Lemon also acted as the store’s “accounting department.” She made deposits, signed checks and reconciled the store’s bank account. Although any entry-level accountant could recognize this situation as an accident waiting to happen, the store’s owner did not. After 12 years of unrelenting temptation, Lemon finally gave in. Thereafter, for years, she systematically stole money from the lighting store using the same method. She would make out a company check to herself (in her own true name), sign it and deposit the proceeds in her personal checking account. To cover the theft, Lemon would do three simple things: First, she’d enter “void” on the check stub when she wrote the check to herself. Next, she would add the amount of the theft to the check stub when she paid for inventory. For example, if she took $5,000 and was paying a vendor $10,000, she would show $15,000 on the vendor’s check stub. That way, the cash account would always stay in balance. Finally, when the checks paid to Lemon were returned in the bank statement, she would tear them up and throw them in the trash. In looking at Lemon’s inelegant scheme from an accounting perspective, one can see that she had her choice of three techniques to cover her tracks: false debits, omitted credits or forced balances. Early Warning Signs of Cash Misappropriation The three principle methods employees use to misappropriate cash can show up early in an organization’s books. CPAs should be alert to simple trends when determining a company’s risk of material embezzlement. Consider one or more of the following: Skimming Decreasing cash to total current assets. A decreasing ratio of cash to credit card sales. Flat or declining sales with increasing cost of sales. Increasing accounts receivable compared with cash. Delayed posting of accounts-receivable payments. Larceny Unexplained cash discrepancies. Altered or forged deposit slips. Customer billing and payment complaints. Rising “in transit” deposits during bank reconciliations. Fraudulent Disbursements Increasing “soft” expenses (for example, consulting or advertising). Employee home address matches a vendor’s address. Vendor address is a post office box or mail drop. Vendor name consists of initials or vague business purpose. (Employees often use their own initials when setting up dummy companies; for example, “JTW Enterprises”). Excessive voided, missing or destroyed checks. FALSE DEBITS Lemon chose the most logical (and common) method for covering a cash embezzlement: the false debit. When Lemon credited the bank account for the checks she made out to herself, the corresponding debit was false. Still, from the standpoint of the accounting equation, the books were in balance. Lemon and other embezzlers have two choices concerning the false debit: The transaction can be allocated to an asset account or an expense account. In Lemon’s case, she added her thefts to the inventory account--an asset. As we CPAs know, that false debit will stay on the books until some action is taken to remove it. In this situation, the lighting store’s inventory was overstated by $416,000 over eight years, as the store never performed a physical count of its inventory. As a result, when Lemon’s crime came to light, a huge writeoff was necessary, almost bankrupting the store. A less obvious move would have been for Lemon to charge the false debit to an expense account, which is written off every year. It doesn’t matter what the expense is, although these are some favorites: advertising, legal expense, consulting fees and other “soft expenses.” Here, the expense for fraud gets written off annually. If the fraud perpetrator can conceal the fraud long enough for the account to be closed to profit and loss, he or she has gone a long way toward avoiding detection—at least on a current basis. OMITTED CREDITS To understand how omitted credits affect the books, imagine Lemon had taken a different tack. Instead of writing checks to herself, she would instead intercept incoming cash receipts before they were posted. Presume further that Lemon would negotiate the checks by forging the endorsement of the lighting store, then endorsing her own name on the checks, subsequently depositing them in her checking account. The net effect would have been that Lemon stole the debit (the cash) and omitted the credit (sales or accounts receivable); in short, she skimmed the money. This is known as an “off-book fraud,” as evidenced by the omission of the transaction from the accounting records altogether. If Lemon had skimmed from sales, there would be only indirect proof of her crime through falling revenue and/or rising costs. But if she had skimmed from accounts receivable, she would need to create a fictitious entry to credit the customers’ accounts; otherwise, the books would be out of balance. FORCED BALANCES Another technique to conceal asset misappropriation is not the best choice. Lemon could have attempted to force the balance of the bank accounts and inventory to cover herself. In that situation, she would have forced the bank reconciliation to equal the amount she was stealing by purposely misadding the transactions. But that technique requires constant attention. Unless the company has lots of cash, forcing the bank balance will eventually result in bounced checks. A simple proof of cash that’s routinely done in an audit will usually catch this scheme. That’s not what happened to Lemon, though. She had a nervous breakdown because of the pressure from all those years of stealing and covering it up; she came forward and confessed. Her embezzlement points out one real benefit of an audit in a small business: Almost any degree of independent review by a CPA would have uncovered what Lemon was doing. Embezzlements can be uncovered, but more importantly, people like Lemon will be much less likely to steal knowing a CPA will be scrutinizing their activities. JOSEPH T. WELLS, CPA, CFE, is founder and chairman of the Association of Certified Fraud Examiners, Austin, Texas. Mr. Wells’ article “So That’s Why They Call It a Pyramid Scheme” (JofA Oct.00, page 91) has won the Lawler Award for best article in the JofA in 2000. His e-mail address is joe@cfenet.com Journal of Accountancy, December 2004 Audits and hotlines stack up as the best crime busters in a new ACFE study. Small Business, Big Losses BY JOSEPH T. WELLS ccupational fraud has become—at least so far—the crime of the 21st century. It is a widespread phenomenon that affects practically every organization. The frauds in the 2004 Report to the Nation on Occupational Fraud and Abuse, from the Association of Certified Fraud Examiners, caused over $761 million in total losses, with a disproportionate percentage committed against small businesses—almost half of the frauds in the study took place in businesses with fewer than 100 employees. Not surprisingly such businesses are less likely to be audited or employ antifraud measures than the larger ones. The 2004 Report to the Nation on Occupational Fraud and Abuse, from the Association of Certified Fraud Examiners, can be downloaded at www.cfenet.com. Several broad conclusions can be drawn from the 2004 report. First, though the losses have been stable over the years, the fact that in one year alone they are approaching $660 billion is cause for concern. Dishonest executives and employees are plying essentially the same schemes with the same results. Second, although large financial statement frauds receive the most attention, they are relatively uncommon compared to asset misappropriations and corruption. Third, small businesses remain the most vulnerable to occupational fraud because of three factors: They are the least likely to have an audit, a hotline or adequate internal controls. Fourth, audits—both internal and external—although excellent prevention devices are not the most effective means of detecting frauds. Fifth, hotlines and other reporting mechanisms are a vital part of any organization’s prevention efforts but should go beyond employees to vendors and customers, too. Finally, occupational fraud cannot be eliminated but organizations that use both hotlines and auditors can greatly reduce these costly crimes. Occupational fraud schemes can be as simple as pilferage of company supplies or as complex as sophisticated financial statement frauds. This article summarizes some of the key findings of certified fraud examiners (CFEs) in cases they investigated. Internal and external auditors and CPAs advising small business clients will learn of the most effective antifraud measures. MEASURING THE COST OF FRAUD Determining the true cost of occupational fraud is an impossible task. Because fraud is a crime based on concealment, organizations often do not know when they are being victimized. Many frauds never are detected or are caught only after they have gone on for several years. Many of those are never reported or prosecuted. In fact, there is no agency or organization that is specifically charged with gathering comprehensive fraud-related information. All of these factors combine to make any estimate of the total cost of occupational fraud just that—an estimate. The study asked CFEs to give their best estimate of the percentage of revenues a typical organization in the United States loses in a year as a result of occupational fraud. The median response was 6%, the same result obtained from previous studies. This is a staggering figure. If multiplied by the U.S. gross domestic product, which for 2004 will total over $11 trillion, it would translate into $660 billion in annual fraud losses (see exhibit 1). Exhibit 1: Total Occupational Fraud Losses VICTIMIZED ORGANIZATIONS The victims of occupational fraud are the organizations that employ the fraud perpetrators and suffer losses as a result of these crimes. Exhibit 2 shows the distribution of frauds in the ACFE survey, based on the type of organization that was victimized. Exhibit 2: Type of Organization Victimized Approximately 46% of the occupational frauds in our study were committed in small businesses (defined as organizations with fewer than 100 employees). The impact of occupational fraud on small businesses was much greater than on larger companies (see exhibit 3). Part of the reason for the larger losses is that small businesses are the least likely to be audited. As noted in the 2002 report, the audit appears to be a powerful deterrent to occupational fraud. Exhibit 3: Median Loss Based on Size of Organization HOW OCCUPATIONAL FRAUD IS COMMITTED A major goal of the study was to gain a better understanding of how fraud is committed and the types of schemes that tend to produce the largest losses. We classified each fraud according to the methods used by the perpetrator. Breaking down occupational frauds into distinct categories also helps CPAs better understand the common characteristics, which in turn assists in the development of better antifraud tools. There are three major categories of occupational fraud to consider: Asset misappropriations. These schemes involve the theft or misuse of an organization’s assets by such means as skimming revenues, stealing inventory or committing payroll fraud. Corruption. Fraudsters wrongfully use their influence in business transactions to procure some benefit for themselves or another person. One of the most common is accepting kickbacks or engaging in conflicts of interest. Fraudulent financial statements. These generally involve falsification of an organization’s financial statements by overstating revenues or understating liabilities or expenses. Exhibit 4: Methods of Fraud—All Occupational Frauds Note: The percentages exceed 100% due to multiple schemes in more than one category. While asset misappropriations were by far the most common of the three categories, occurring in over 90% of the cases, they also had the lowest median loss, at $93,000. Conversely, fraudulent financial statements were the least common (7.9%) but had the highest median loss at $1,000,000. (See exhibit 4 and exhibit 5.) Exhibit 5: Breakdown of Asset Misappropriations Note: The percentages exceed 100% due to multiple schemes in more than one category. CASH MISAPPROPRIATIONS Of the cases in the study, 87% involved some form of cash misappropriation. Cash frauds fall into one of three categories: Fraudulent disbursements. A perpetrator causes his organization to disburse funds through some trick or device, such as submitting false invoices or forging company checks. Skimming. Cash is stolen from an organization before it is recorded on the organization’s books and records. Cash larceny. Cash is stolen from an organization after it has been recorded on the organization’s books and records. Approximately three-fourths of the cash frauds in the study involved some form of fraudulent disbursement, making this the most common category by far. Schemes that involved a fraudulent disbursement also had the highest median loss, at $125,000. (See exhibit 6.) Exhibit 6: Breakdown of Cash Misappropriations Note: The percentages exceed 100% due to multiple schemes in more than one category. FRAUDULENT DISBURSEMENTS Just over half of the fraudulent disbursement cases in our study involved billing fraud, making this the most common type. Among these cases the highest median loss occurred in schemes involving check tampering. (See exhibit 7.) The schemes included the following: Exhibit 7: Breakdown of Fraudulent Disbursements Note: The percentages exceed 100% due to multiple schemes in more than one category. Billing. A fraudster causes the victimized organization to issue a payment by submitting invoices for fictitious goods or services, inflated invoices, or invoices for personal purchases. Example: When a secretary for a public company interceded on behalf of an unpaid legitimate supplier and the accounts-payable department could not locate the original invoice, it nonetheless agreed to pay the vendor based on a fax copy. Seizing on this basic internal control deficiency, the secretary and two nonemployee accomplices set up three phony companies, submitting fax copies of doctored original invoices for “consulting fees.” The fraud was discovered when a manager questioned a huge variation in the budget—but not until four years and $1.7 million later. Payroll. An employee causes the victim organization to issue a payment by making false claims for compensation. Example: A controller for a small nonprofit organization, believing she should be earning twice her salary, added a “ghost” employee to the payroll. Since she managed both the bank accounts and the books—a serious internal control deficiency—that was easy enough to do. Every pay period, she wrote a paycheck to the nonexistent ghost, but thanks to the company’s direct payroll deposit policy, the money actually went straight to her bank account. The bank evidently never noticed the discrepancy. During a surprise audit of the payroll account, the controller mysteriously left town. It didn’t take the auditors long to figure out why when they matched the direct deposits and uncovered the scheme, which had cost the nonprofit $208,000 over three years. Expense reimbursements. An employee enters a claim for reimbursement of fictitious or inflated business expenses. Check tampering. The perpetrator converts an organization’s funds by forging, altering or stealing a check. Example: The administrative assistant to a CEO of a privately held company knew her boss’s habits all too well. Each week, right before lunch, she presented him with a stack of checks, which he quickly signed. He didn’t notice the checks were prepared in erasable ink. The administrative assistant—who also acted as the company’s bookkeeper—would change the payee on the checks, deposit the funds to her own bank account and post the checks to various company expenses in order to conceal the fraud. When the checks were returned in the bank statement, the assistant would change the name back to the payee to whom the payment was originally directed. In her haste, however, she altered checks meant to pay the boss’s personal expenses. In the end, the boss’s appetite cost him a half-million dollars. Register disbursements. An employee makes false entries on a cash register to conceal the fraudulent removal of currency. Example: A crafty service station attendant discovered a flaw in the cash register system; it could put a sale on hold until the transaction was completed. Simply depressing the “hold” button for a few extra seconds made the transaction disappear altogether. So when a customer bought gasoline, the clerk would erase the sale and pocket the proceeds. Company auditors finally noticed a large disparity when they compared fuel inventory to sales. After exhausting all other possibilities (including leaks in the fuel storage tanks), they installed surveillance cameras over the cash registers and caught the fraudster on tape. This simple scheme cost the company $132,000. DETECTING FRAUD As in the 2002 study, the most common means of detection—by a wide margin—was through tips (see exhibit 8). Recognizing the value of encouraging tips, section 301 of the Sarbanes-Oxley Act requires audit committees of publicly traded companies to establish procedures for “the confidential, anonymous submission by employees of the issuer of concerns regarding questionable accounting or auditing matters.” Exhibit 8: Initial Detection of Occupational Frauds Note: The percentages exceed 100% because some respondents identified more than one method. Respondents were asked what, if any, antifraud measures they had in place at the time the frauds occurred. They listed anonymous reporting mechanisms (typically hotlines), internal audit or fraud examination departments and external audits. Exhibit 9 shows the percentage of victimized organizations that had implemented these mechanisms. Exhibit 9: Frequency of Antifraud Measures Note: Some respondents had more than one measure in place. HOTLINES WORK To test the effectiveness of each antifraud control, the study measured the median loss for organizations with controls against those without them. The figures showed that anonymous reporting mechanisms had the greatest impact on reducing fraud losses. Organizations that did not have reporting mechanisms suffered median losses that were more than twice as high as organizations with them. (See exhibit 10.) This was consistent with the findings of the 2002 report. Exhibit 10: Median Loss Based on Whether Organization Had a Hotline This result is also consistent with the data the ACFE gathered showing the most common way for frauds to be discovered is through tips. Obviously, hotlines and other reporting mechanisms are designed to facilitate tips on wrongdoing. The fact that tips were the most common means leading to detection—combined with the fact that organizations that had reporting mechanisms showed the greatest reduction in fraud losses—indicates this is an extremely valuable antifraud resource. The effectiveness of these reporting mechanisms is significantly higher when they are made available to customers, vendors and other third parties—not just employees. Organizations that rushed to implement employee hotlines to comply with Sarbanes-Oxley might profit from adding these valuable additional sources of information. Curiously, anonymous reporting mechanisms were the least common antifraud measure of the three we tested for; only slightly more than one-third of victim organizations in our study had established anonymous reporting structures at the time they were victimized. THE WAGES OF CRIME Generally speaking, the position perpetrators held in an organization and their annual income tended to be the most significant factors in the size of losses in a fraud scheme. As the employees’ level of authority rose, so did fraud losses. In just under 5% of the cases in the ACFE study, the perpetrator earned more than $200,000 a year—but, in those cases, median losses exceeded $1 million (see exhibit 11). Exhibit 11: Median Loss Based on Perpetrator’s Annual Income OBSERVATIONS In many respects, the ACFE’s 2004 report supported its findings of 2002: Small businesses still were disproportionately affected by occupational frauds, asset misappropriations still accounted for approximately 90% of reported cases and the vast majority of perpetrators were still first-time offenders. As in 2002 occupational frauds still were much more likely to be detected by a tip than through an internal or external audit; and anonymous reporting mechanisms such as hotlines still exhibited the greatest impact on occupational fraud losses. But the 2004 report also presents new information about occupational fraud that is especially critical in the post Sarbanes-Oxley world. For example, the ACFE found that over half of all frauds committed by owner/executives were detected through a tip, which was much higher than the rate for fraud in general. By comparison, only 6% of these cases were caught through internal controls. Obviously, this was because owners and executives often were able to override controls to commit fraud. Given the fact that schemes by owner/executives now must be disclosed to audit committees regardless of whether they are material, and that these schemes tend to be the most costly, the study offers strong support for Sarbanes-Oxley’s requirement for the establishment of anonymous reporting mechanisms. RESOURCES AICPA Resources Books CPA’s Handbook of Fraud and Commercial Crime Prevention (# 56504JA). Financial Reporting Fraud: A Practical Guide to Detection and Internal Control (# 029879JA). Fraud Detection in a GAAS Audit (# 006615JA). CPE Introduction to Fraud Examination and Criminal Behavior (# 730275JA). Identifying Fraudulent Financial Transactions (# 730244JA). Finding the Truth: Effective Techniques for Interview and Communication (# 730164JA). For more information, to register or to place an order, go to www.cpa2biz.com or call the Institute at 888-777-7077. AICPA antifraud initiatives Antifraud and Corporate Responsibility Resource Center, http://antifraud.aicpa.org/. SAS no. 99 information. Management Antifraud Programs and Controls (SAS no. 99 exhibit). Fraud Specialist Competency Model. Free corporate fraud prevention training and CPE. Academia outreach and assistance. Other antifraud activities. The 2004 report also looked more deeply into the ways in which small businesses were affected by occupational fraud. The ACFE found one-third of the small business cases involved a billing scheme, and one-third involved check tampering—two forms of fraudulent disbursements that typically succeed when there is a lack of control over the company checkbook. This suggests that if there is one critical area where small businesses should focus their antifraud efforts and resources, it is in establishing solid controls—including a strong separation of duties—over the check-cutting and payables functions. The ACFE also found that very few small businesses in the study—only 31%—had any form of internal audit or fraud examination department. But among that group, it was the internal audit department that detected half of the frauds. This suggests that internal auditors can have a significant impact in detecting occupational fraud and minimizing losses in small businesses. JOSEPH T. WELLS, CPA, CFE, is founder and chairman of the Association of Certified Fraud Examiners and professor of fraud examination at the University of Texas at Austin. Mr. Wells won the Lawler Award for the best JofA article in 2000 and 2002 and has been inducted into the Journal of Accountancy Hall of Fame. His e-mail address is joe@cfenet.com. Journal of Accountancy, May 2004 One way to deter dishonest employees: Make vacations mandatory. The Case of the Pilfering Purchasing Manager BY JOSEPH T. WELLS hris, we have a problem,” said the voice on the other end of the line. “Our purchasing manager, Bruce, is on vacation and we think we have discovered some irregularities.” Chris Rosetti, CPA, swung into action. Rosetti—a partner with BST Advisors LLC in Albany, New York—had done limited work for the client, a state agency, in the past. This time, he quickly discovered the agency had two key internal control deficiencies. The first was that Bruce hadn’t been forced to use his vacation time in three years. Rosetti, a veteran adviser in at least 100 fraud cases, had seen this situation many times: Once employees start committing fraud, they can’t take time off because they need to constantly cover up what they’re doing. The second deficiency was that Bruce was allowed to approve new vendors. So, not only was he approving the purchases, but he also was selecting the vendors—a serious breach of separation of duties. When he was forced to take time off to attend to his sick wife, the agency received requests for payment on three invoices for which there were no vendor files. They were later located in Bruce’s desk. That’s when Rosetti was called in. In examining the vendor files, Rosetti noted a number of oddities. For one, Bruce had approved the purchase of a large quantity of high-priced “computer cleaning kits”—many more than the agency had computers. And an employee remembered the so-called kits consisted of nothing more than Q-tips, gauze pads and rubbing alcohol. “And I noticed there were multiple purchases just under Bruce’s $2,500 approval limit. Purchases over that amount would have required supervisory approval,” Rosetti said. The Kickback Checklist Favoritism toward one vendor. One or more of these red flags call for a closer look at the operations of a purchasing agent. Excessive purchases from one vendor. He or she doesn’t take time off. The purchasing agent has personal financial problems. The agent’s lifestyle is too extravagant for his or her income. Prices charged are higher than market average. Expenditures come in just under the review limit. Multiple purchases over a short period. Substandard products or services. Accelerated payment of invoices. Close personal relationship between purchasing agent and vendor. Sole-source purchases of merchandise or services. PRESERVING EVIDENCE BY THE BOOK Rosetti made two photocopies of the documents and returned the original files to Bruce’s desk. “If Bruce had come back before I completed my investigation,” said Rosetti, “I didn’t want him to become suspicious and perhaps destroy other key evidence I had not yet identified.” Rosetti locked one set in his own filing cabinet. In doing this, the CPA, also a certified fraud examiner, was following a standard industry practice. (Under the “best evidence” rule accepted by courts, if the original documents are lost or destroyed, a copy can substitute for the original.) Examination of the documents had revealed that although there were three different vendor names, they all had identical Atlanta addresses and used the same federal tax I.D. number. Believing he was seeing only the tip of the iceberg, Rosetti asked that his client do a computer run on payments made to the suspicious vendors over a five-year period. Bingo. The total exceeded $350,000, with all of the payments just under Bruce’s approval limit. Rosetti next conducted discreet interviews with Bruce’s coworkers and superiors. “As a state worker,” Rosetti found out, “he had a rather modest salary considering his responsibilities. And he was married, had six children and a seriously ill wife.” At its warehouse, Rosetti tried to confirm the agency had actually received the items on orders Bruce had approved. “No one there could remember receiving more than a few computer cleaning kits.” And the warehouse manager told Rosetti that he recalled one vendor had given Bruce a television that—boldly— was shipped directly to the office. CLOSING IN The CPA felt he’d developed enough evidence to confront his suspect. Through experience and training Rosetti knew that a confession was more likely if Bruce wasn’t interviewed in the comfort of his own office. “The key to obtaining a confession is to create stress in the subject, who then will often admit wrongdoing to alleviate it,” Rosetti said. When Bruce returned from vacation, his supervisor told him Rosetti was conducting an audit of agency practices and needed to see him at the CPA’s office. “It is best to conduct admission-seeking interviews by complete surprise,” said Rosetti. “You don’t want the subject to have time to think about what to say. And you don’t want to schedule such an interview with much advance notice, because it is possible that a suspect simply wouldn’t show up.” So when Bruce arrived at the CPA’s office, he had no idea what was in store for him. Rosetti had avoided any possibility of a tip-off. He spent a few minutes asking Bruce perfunctory questions about his duties and procedures. Then he completely changed his tack. “Bruce,” Rosetti said quietly, “we have evidence that you have been receiving kickbacks from vendors.” The color completely drained from Bruce’s face. “As confessions go, this one was easy,” the CPA said. “In less than an hour, I had the whole story, which I put in the form of a written statement for Bruce to sign. Like many other suspects, he was relieved that it was finally out in the open.” PRACTICAL TIPS TO REMEMBER When closing in on a fraud suspect Make copies of all suspicious documents. Don’t alert a suspect he or she is about to be interviewed. Interview the suspect in a location unfamiliar to him or her when seeking an admission of guilt. Don’t show the suspect evidence unless necessary for a confession. Convert a verbal confession into a written statement. THE ENVELOPE, PLEASE According to Bruce, his life of crime began when he received a $100 money order sent to his home. There was no return address on the envelope, no note, nothing. The purchasing agent, who was financially strapped, cashed the money order and spent the funds. A few days later, he received a telephone call from a vendor who had recently started doing business with Bruce. “Did you get the $100 I sent to your home?” the vendor asked. Bruce replied, “Oh, that money was from you?” The vendor chuckled, “Yes, I just wanted to send you a little gift to thank you for your business.” The “vendor gift” is one of the most common ways unwary employees are compromised. “Once Bruce had spent the hundred dollars, he was hooked,” said Rosetti. “The vendor told the purchasing agent there was more to come if he continued to do business with his company. Being the needy guy he was, he started approving purchases in exchange for regular cash payments from the vendor.” In such schemes, the products or services eventually become substandard, overpriced or nonexistent, which brings up one big problem with purchasing agents who receive kickbacks: They’re hardly in a position to complain. So there is little the bribe-taker can do about it. In Bruce’s case the vendor just stopped shipping merchandise altogether. “The vendor told Bruce that unless he continued to approve invoices for payment, he would reveal his conduct to the agency,” Rosetti said. “That’s one of the reasons Bruce was relieved when he confessed; he always worried he would be discovered.” Considering all of that worry, Bruce sold out cheap. For $350,000 in inflated or nonexistent purchases, the state worker got only about 1%, or around $3,500. The vendor sent the $100 payoffs—either in cash or by money order—to a service station owned by Bruce’s father-inlaw, who didn’t know their real purpose. “Because Bruce was very cooperative and contrite about his activities, I asked him to help get evidence against the vendor,” Rosetti said. “We recorded a series of his telephone calls with the vendor, and sure enough, the vendor offered to send money for approving invoices.” The case was turned over to the United States Attorney. Unfortunately, the prosecutor could not press charges against the vendor because the voice on the tape recording—analyzed by a spectrograph—was not sufficiently distinct from that of the vendor’s son, who worked at the same company. Crime didn’t pay for Bruce, though: He was fired, ordered to pay restitution, spent six months in jail and was placed on five years’ probation. By any measure, that’s a hefty price to pay. PREVENTING KICKBACKS The agency could have easily avoided this crime by using simple but effective control measures such as Job rotation. Bruce had been in the same position for more than six years. Purchasing agents are subject to constant temptation by unscrupulous vendors. Therefore they shouldn’t be in the same job and deal with the same vendors indefinitely. But many small organizations don’t have enough staff to rotate jobs. In that case a CPA should be hired to closely examine key risk areas such as purchasing, even if a full audit is not necessary. Closer supervision. The agency’s manager knew of Bruce’s financial woes. After adding up the facts—an employee in financial straits who has the authority to approve purchases— Bruce’s supervisor should have been more diligent in overseeing his duties by periodically examining the purchases. Without invading employees’ privacy, managers should be alert to workers’ money pressures. Separation of duties. The most effective control mechanism to prevent employee fraud is the separation of duties. Ideally, different personnel will handle the following duties: vendor approval, purchase requisitions, purchase approval, receiving and payment. This will not prevent collusion, but most frauds are committed by one individual acting alone. As in most fraud cases, there were no winners in this one. The agency lost money and public trust; the vendor lost what could have been a long-term customer; and Bruce lost his job, reputation and freedom. As Rosetti succinctly put it, “With basic controls and oversight, this crime wouldn’t have happened.” Joseph T. Wells, CPA, CFE, is founder and chairman of the Association of Certified Fraud Examiners and professor of fraud examination at the University of Texas at Austin. He won the Lawler Award for the best JofA article in 2002 and has been inducted into the Journal of Accountancy Hall of Fame. Resources Books CPA’s Handbook of Fraud and Commercial Crime Prevention (# 56504JA) Financial Reporting Fraud: A Practical Guide to Detection and Internal Control (# 029879JA) Fraud Detection in a GAAS Audit (# 006615JA). CPE Introduction to Fraud Examination and Criminal Behavior (# 730275JA) Identifying Fraudulent Financial Transactions (# 730244JA) Finding the Truth: Effective Techniques for Interview and Communication (# 730164JA) Conference AICPA Conference on Advanced Litigation Services and Fraud September 26–29, 2004 JW Marriott Desert Ridge, Phoenix For more information or to place an order or to register, go to www.cpa2biz.com or call the Institute at 888-777-7077. AICPA Antifraud Initiatives Antifraud and Corporate Responsibility Resource Center, http://antifraud.aicpa.org/. SAS no. 99 information. Management Antifraud Programs and Controls (SAS no. 99 exhibit). Fraud Specialist Competency Model. Free corporate fraud prevention training and CPE. Academia outreach and assistance. Other antifraud activities.